Cloak Phone: Blackout Mobile’s John McAfee-Backed Blockchain Luxury Privacy Smartphone Launches


Privacy Backed, Cloak Phone Launched by John McAfee's Team

John McAfee, the crypto-crazed supporter and entrepreneur, took to Twitter to announce early access applications are available for his new Cloak Phone, described as “the ultimate private smart phone.” Find out how it works today in our review.

What is the Cloak Phone?

The Cloak Phone is an upcoming smartphone in development by Blackout Mobile and Team McAfee. The phone aims to provide “the luxury of privacy” to users by creating “the ultimate private smart phone.”

You can sign up for the Cloak Phone’s early access online today at CloakPhone.com. However, the phone isn’t scheduled to launch until Q2 2019. The website is filled with digital mock-ups of the device, so it doesn’t appear that a real-world prototype has been made.

The goal of the Cloak Phone is to allow users to use a smartphone without divulging intimate personal details with every tap. The website explains that existing smartphones, apps, and cell providers compromise our privacy and personal safety. Simply by using your smartphone, you’re giving away your name, address, phone number, date of birth, fingerprints, social security number, credit card numbers, bank account logins, cryptocurrency account logins, passwords, photos, emails, texts, contacts, browsing history, and location history.

Some of this data is available instantly to your carrier and mobile device operator. Other data can easily be discovered with a warrant.

Among other core features, the Cloak Phone uses blockchain technology to enhance device security.

How Does Cloak Phone Work?

Cloak Phone is powered by an operating system called Fortress OS. That operating system has native security features designed to make it the more secure mobile operating system in the world.

Some of the built-in features include a baseband firewall, for example, and a verified secure boot. Together, these features prevent unauthorized applications from launching while also blocking incursion attempts like Stingray attacks and eavesdropping.

Additionally, all calls and texts are encrypted end-to-end over the device. The Cloak Phone also claims to offer zero-day vulnerability defenses and full disk encryption.

Interestingly, the Cloak Phone is also compliant with the GDPR, the new data storage requirements from the European Union. The GDPR requires all personal data to:

“be processed in a manner that ensures appropriate security of the personal data, including protection against unauthorized or unlawful processing and against accidental loss, destruction or damage, using appropriate technical or organizational measures.”

The entire Fortress OS and Cloak Phone ecosystem is built on blockchain technology. Specifically, the Cloak Phone uses Ethereum Casper. The network uses zero-transaction cost coins and blockchain-based license management to enhance security on the device.

Cloak Phone Features

The Cloak Phone emphasizes greatly on privacy and uses the Fortress Operating System to achieve this. Users are provided with a wide range of features have the ability to verify secure boot, the integration of the encryption AES256, efficient data handling, eliminate one’s phone from being entered into and eavesdropped and to ensure that harmful data have been blocked altogether.

Some of the core features of Fortress OS include:

Baseband Firewall: The Cloak Phone protects from eavesdropping and Stingray attacks using its baseband firewall. These are popular strategies used by law enforcement officers to snoop on unsuspecting smartphone users.

Verified Secure Boot: Fortress OS has a secure boot feature that prevents unauthorized applications from launching during the boot process.

Multi-layered Security: Fortress OS has multi-layered security, including “zero-day vulnerability and incursion defenses.” Fortress OS also has data handling and remote wipe, among other features.

Full Disk Encryption: Fortress OS offers full disk encryption using AES-256.

Privacy: Fortress OS provides additional privacy by preventing advertisements from tracking and protecting your meta-data.

End-to-End Call and Text Encryption: The Cloak Phone and Fortress OS encrypts calls and texts end-to-end.

GDPR Compliant: Another unique feature of the Cloak Phone is that it’s compliant with the General Data Protection Regulation, or GDPR. The GDPR requires all personal data to be processed in a secure way, and the Cloak Phone complies with this requirement.

Ultimately, the information listed above is all we know about the Cloak Phone. The CloakPhone.com website features a single page of information. Obviously, we’re still nearly a year away from the release of the Cloak Phone, so we expect more details – like tech specs – to emerge over the coming months.

Who’s Behind the Cloak Phone?

John McAfee’s name has been attached to the Cloak Phone since launch. However, McAfee and his team didn’t directly manufacture the phone. Instead, the phone is a product of Blackout Mobile. The CloakPhone.com homepage claims the device was “inspired by John McAfee”. Additionally, the page lists affiliations with the McAfee Crypto Team, Kitely Tech, and BrandFire.

The main Cloak Phone office is located in Jericho, New York.

Conclusion

With more and more businesses turning to mobile devices to conduct confidential exchanges, the necessity for increased security and privacy automatically forms. To see that the Cloak Phone has targeted common problems with using a mobile device is reassuring..

Ultimately, the Cloak Phone is being marketed to enterprises and end users concerned about privacy. Enterprises can benefit from the device by enhancing office security. They no longer have to be concerned about employees connecting compromised devices to the network.

At the same time, end users focused on security can enjoy end-to-end security, full disk encryption, and other valuable features.

Right now, early access applications are available online at CloakPhone.com. However, the phone isn’t scheduled to launch until Q2 2019.

Here's a look at some of the reactions on Twitter:

Get Daily Headlines

Enter Best Email to Get Trending Crypto News & Bitcoin Market Updates

What to Know More?

Join Our Telegram Group to Receive Live Updates on The Latest Blockchain & Crypto News From Your Favorite Projects

Join Our Telegram

Stay Up to Date!

Join us on Twitter to Get The Latest Trading Signals, Blockchain News, and Daily Communication with Crypto Users!

Join Our Twitter

Add comment

E-mail is already registered on the site. Please use the Login form or enter another.

You entered an incorrect username or password

Sorry, you must be logged in to post a comment.
Bitcoin Exchange Guide